Search Results - (( java implementation level algorithm ) OR ( using set ((method algorithm) OR (mead algorithm)) ))
Search alternatives:
- implementation level »
- java implementation »
- method algorithm »
- level algorithm »
- mead algorithm »
- using set »
-
1
Bees algorithm enhanced with Nelder and Mead method for numerical function optimisation
Published 2019“…In order to enhance its accuracy and convergence rate, it is proposed to employ the Nelder and Mead (NM) method to implement the local search phase of the algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…The proposed PID controller, optimized using AOA, is contrasted with PID controllers tuned via alternative algorithms including the hybrid Nelder-Mead method (AEONM), artificial ecosystem-based optimization (AEO), differential evolution (DE), and particle swarm optimizer (PSO). …”
Get full text
Get full text
Get full text
Article -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
4
Wastewater treatment process: a modified model for oxidation pond
Published 2021“…The model has been solved numerically by using the 4th order Runge-Kutta method and a parameter fitting technique namely Nelder-Mead simplex algorithm embedded in MATLAB software. …”
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Mathematical modelling of covid-19 transmission and vaccine effectiveness for a university
Published 2024“…The models were numerically solved using the Runge Kutta fourth order method (RK4) and parameter fitting techniques namely Pattern Search and Nelder-Mead Simplex algorithm embedded in MATLAB software. …”
Get full text
Get full text
Thesis -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The third set affirmed that the enhancement on the proposed algorithm, which made use of indexing method that suits the medoids, could boost the performance to about 9 to 27 times in terms of execution time depending on the complexity of the dataset. …”
Get full text
Get full text
Thesis -
14
A new ant based rule extraction algorithm for web classification
Published 2011“…Web documents contain enormous number of attributes as compared to other type of data. Ant-Miner algorithm is also still lacking in efficiency, accuracy and rule simplicity because of the local minima problem.Therefore, the Ant-Miner algorithm needs to be improved by taking into consideration of the accuracy and rule simplicity criteria so that it could be used to classify Web documents data sets or any large data sets.The best attribute selection method for Web texts categorization is the combination of correlation-based evaluation with random search as the search method.However, this attribute selection method will not give the best performance in attributes reduction. …”
Get full text
Get full text
Get full text
Get full text
Monograph -
15
Logistic regression methods for classification of imbalanced data sets
Published 2012“…These results can be seen as further explanation on the success of Truncated Newton method in TR-KLR and TR Iteratively Re-weighted Least Square (TR-IRLS) algorithm respectively, because of the equivalence of iterative method used by these algorithms. …”
Get full text
Get full text
Thesis -
16
An Alternative Algorithm for Soft Set Parameter Selection using Special Order
Published 2015“…Comparative analysis were performed between the proposed algorithm and the state-of-the-art parameter reduction algorithm using several soft set in terms of parameter reduction…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Hybrid bat algorithm for minimum dominating set problem
Published 2017“…This method uses population-based approach called bat algorithm (BA) which explore a wide area of the search space, thus it is capable in the diversification procedure. …”
Get full text
Get full text
Article -
18
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Data pre-processing on the data set may improve the classification results. The methods used were over-sampling, under-sampling and hybrid sampling, which modified the data set class distribution to achieve a better result. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Logistic Regression Methods with Truncated Newton Method
Published 2012“…Instead of using IRLS procedure as used by TR-KLR and TR-IRLS, the proposed algorithms implement Newton-Raphson method as the outer algorithm of Truncated Newton for KLR and RLR respectively. …”
Get full text
Get full text
Article -
20
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item
